CFP last date
20 January 2025
Reseach Article

Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks

by Sabah Shamsh, Vandana Dubey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 23
Year of Publication: 2013
Authors: Sabah Shamsh, Vandana Dubey
10.5120/12110-8325

Sabah Shamsh, Vandana Dubey . Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks. International Journal of Computer Applications. 69, 23 ( May 2013), 14-21. DOI=10.5120/12110-8325

@article{ 10.5120/12110-8325,
author = { Sabah Shamsh, Vandana Dubey },
title = { Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 23 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number23/12110-8325/ },
doi = { 10.5120/12110-8325 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:06.195644+05:30
%A Sabah Shamsh
%A Vandana Dubey
%T Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 23
%P 14-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

At the present time, Mobile Ad-Hoc Networks are being used in wide variety of applications, such as, mobile commerce, transportation, sensor networks etc. Hence, secure deployment of MANETs is a necessary condition because MANETs are most vulnerable to attacks. Lots of research has been performed on deployment of IDS in MANETs, but, using honeypots in MANETs is a new concept. Honeypots are used to uncover the motive of attacks on any network. Only one model for using honeypots in MANETs has been proposed by Ali Mirzaei et al in Nov, 2012, ISSN 2301-2005. This research mainly focuses on taking the work further by using roaming honeypot technique in MANETs.

References
  1. Ali Mirzaei et al, "Use of Honeypots along with IDS in Cluster-Based MANETs," American Journal of Scientific Research, ISSN 2301-2005 Issue 80 November, 2012, pp. 155-163.
  2. Sherif M. Khattab et al, "Roaming Honeypots for Mitigating Service-level Denial-of-Service Attacks," Proc. IEEE ICDCS'04, 1063-6927.
  3. HoneySpot: The Wireless Honeypot for Monitoring the Attacker's Activities in Wireless Networks by Raúl Siles, The Spanish Honeynet Project (SHP), http://www. honeynet. org. es
  4. M. Wei and K. Kim, "Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks," Journal Of Communications and Networks, vol. 14, no. 3, June, 2012.
  5. B. Sun et al, "Intrusion Detection System in Mobile Ad-Hoc Networks and Wireless sensor Networks," IEEE Wireless Communications, October, 2007, 1536-1284.
  6. Y. Zhang, W. Lee and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM Wireless Networks, vol. 9, no. 5, Sept 2003, pp. 361-78
  7. Y. Huang et al. , "Cross Feature Analysis for Detecting Ad-Hoc Routing Anomalies," Proc. IEEE ICDCS '03, Providence, Rl, May 2003, pp. 478-87.
  8. Y. Huang and W. Lee, "A Cooperative Intrusion Detection System for Ad-Hoc networks," ACM SASN '03, Fairfax, VA, 2003, pp. 135-47.
  9. Shamir, A. (1984). Identity based cryptosystems and signature schemes. In Proceedings of the CRYPTO'84.
  10. F. R. Yu and H. Tang, Distributed node selection for threshold key management with intrusion detection in mobile ad-hoc networks, Wireless Network (2010) 16:2169-2178.
  11. J. Li. et al. A scalable location service for geographic ad-hoc routing. In Proc. 6th Annual ACM/IEEE Int'l. Conf. Mobile Comp. Net. (MOBICOM), pages 120–130, 2000.
  12. S. Giordano and M. Hamdi. Mobility management: The virtual home region. Tech. report, October 1999.
  13. Yu-Chee Tseng et al, "Location Awareness in Ad-hoc Wireless Mobile Networks", IEEE, 2001, 0018-9162.
  14. Lance Spitzner, 2003-07-17, "Honeytokens: The Other Honeypot"
  15. Lance Spitzner, "Honeypots: Catching the Insider Threat", Honeypot Technologies Inc. , Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pages- 170-179, 2003.
  16. Lance Spitzner, Honeypots: Tracking Hackers, Pearson Education, Inc. , 2003.
  17. L. Prema Rajeswari, R. Arockia Xavier Annie, A. Kannan, "Enhanced Intrusion Detection Techniques for Mobile Ad-hoc Networks," ICTES – 2007, Dec 20-22, 2007, pp. 1008-1013.
  18. Suen Yek, "Implementing network defense using deception in a wireless honeypot", syek@student. ecu. edu. au
  19. Liu Dongxia, "An Intrusion Detection System Based on Honeypot Technology", International Conference on Computer Science and Electronics Engineering, IEEE 2012, DOI 10. 1109/ICCSEE. 2012. 158
  20. Rick Schoeneck, "Wireless Honeypot", GIAC Security Essentials Certification (GSEC), Version 1. 4b, Option 1, June 8,2003.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Roaming Honeypots Zone-Based MANETs